Our pass rate is high to 98.9% and the similarity percentage between our 70 680 pdf study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Microsoft 70 680 pdf exam in just one try? I am currently studying for the Microsoft 70 680 pdf exam. Latest Microsoft 70 680 pdf Test exam practice questions and answers, Try Microsoft microsoft 70 680 Brain Dumps First.
2017 NEW RECOMMEND
Free VCE & PDF File for Microsoft 70-680 Real Exam
Pass on Your First TRY 100% Money Back Guarantee Realistic Practice Exam Questions
Q81. – (Topic 6)
You use a computer that has Windows 7 Enterprise installed.
You install Windows Vista Enterprise to a different partition. You discover that the computer boots to Windows Vista by default.
You need to ensure that the computer boots to Windows 7 Enterprise by default.
What should you do?
A. On the General tab in the msconfig tool, select the Selective startup option button, and then select the Use original boot configuration check box.
B. On the Boot tab in the msconfig tool, highlight the Windows 7 boot entry and select the Make all boot settings permanent check box. Then, click Apply.
C. From an elevated command prompt in Windows Vista, run the bcdedit /default (default) comma
D. From an elevated command prompt in Windows 7 run the bcdedit /default (current) command
Q82. HOTSPOT – (Topic 4)
You are running windows 7 on a portable computer. A custom power plan named "On The Move" is optimized for battery life.
The computer remains running when the portable computer is closed.
You need to change a setting so that when you close the portable computer, it enters sleep mode.
Which setting should you change? (To answer, select the appropriate setting in the work area.)
Q83. – (Topic 3)
You have a computer that runs Windows 7 Home Premium.
You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Perform a Windows Anytime Upgrade.
B. Download and run the Windows 7 Upgrade Advisor.
C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
Windows Anytime Upgrade
Q84. HOTSPOT – (Topic 5)
A company has client computers that run Windows 7.
You need to secure a virtual private network (VPN) connection on the client computers. The remote access server must verify the identity of the client computers without requiring user credentials.
Which authentication protocol should you use? (To answer, select the appropriate setting or settings in the work area.)
Q85. – (Topic 1)
Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that other computers in the branch office can access the cached content on your computer.
What should you do?
A. Turn on Internet Information Services (IIS).
B. Configure the computer as a hosted cache client.
C. Configure the BranchCache service to start automatically.
D. Modify the Windows Firewall with Advanced Security rules.
Distributed Cache Mode Distributed Cache mode uses peer caching to host the branch office cache among clients running Windows 7 on the branch office network. This means that each Distributed Cache mode client hosts part of the cache, but no single client hosts all the cache. When a client running Windows 7 retrieves content over the WAN, it places that content into its own cache. If another BranchCache client running Windows 7 attempts to access the same content, it is able to access that content directly from the first client rather than having to retrieve it over the WAN link. When it accesses the file from its peer, it also copies that file into its own cache. When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. You must select Allow the connection for the BranchCache client to be able to send traffic on this port.
Q86. – (Topic 3)
You have a computer that runs Windows 7.
You have a system image backup of the computer.
You install a new application that is configured to run as a service.
You restart the computer and receive a STOP error message.
You need to successfully start Windows 7 in the minimum amount of time.
What should you do?
A. Start the computer from the Windows 7 installation media and select Startup Repair.
B. Start the computer and select Last Known Good Configuration from the advanced startup options.
C. Start the computer and select Safe Mode from the advanced startup options. Restore a restore point.
D. Start the computer and select Safe Mode from the advanced startup options. Restore the system image.
Last Known Good Configuration (Advanced) ) feature in Advanced Boot Options is a recovery option that you use to start your computer with the most recent settings that worked. Last Known Good Configuration (Advanced) restores registry information and driver settings that were in effect the last time the computer started successfully. You should use the Last Known Good Configuration (Advanced) feature when you cannot start Windows 7 after you make a change to your computer, or when you suspect that a change that you just made is causing a problem, for example, if you cannot start Windows after you install a new video driver. When you start your computer by using the Last Known Good Configuration (Advanced) feature, Windows 7 uses the configuration stored in the following registry key: HKEY_LOCAL_MACHINE\\System\\CurrentControlSetXX (where by XX are numbers starting with 01 and rising in number to 02, 03, 04 and so on). This is the registry key that is used to store the configuration settings for the Drivers and Services on the system. Each time you boot the system, Windows will be assisted booting by using the registry key "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet" which will point to another control set key, normally HKEY_LOCAL_MACHINE\\System\\CurrentControlSet01, (depending on how the system is configured) which contains the setting for the current boot process. Each time Windows boots there will also be a values created under the "HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Select" key. These contain REG_DWORD data that enable the Control Keys to operate the way they are designed to. These values tell the CurrentControlSet key which numbered CurrentControlSet to point to enable Windows to boot successfully. The data that tells Last Good Known Configuration which numbered CurrentControlSet to load is also stored under these values. They also contain the data that tells Windows which CurrentContolSet not to use, as there is information stored that lets Windows know what CurrentControlSet has failed to load when Windows was unable to boot.
The Last Known Good Configuration CurrentControlSet will change each time the system configuration for the control set changes. This means that each time you install or uninstall a driver or service, a new numbered CurrentControlSet will be created and stored. If you alter the system, and it is then unable to boot, the Last Known Good Configuration will point to the CurrentControlSet that was last used in a successful boot.
This happens each time that Windows boots and there should typically be only four control sets, although it is not uncommon to have five or six of these Control Sets contained in the registry. Windows will keep track of how many Control Sets are stored and should clear old ones once a certain amount is reached.
If installing a new program or device should render the system unbootable, you may be able to use "Last Known Good Configuration" to restore the damaged Control Set registry key with an earlier key that enabled the system to boot. This will remove the registry key(s) that relates to the problem driver or service. It will not remove the actual driver or service but will render it unusable. This could result in any program or device the was installed after the last boot having to be re-installed as their configuration setting will have been over written. When you perform a system restore following a normal boot or following a boot that uses the Last Known Good Configuration (Advanced) option, a restore point is created that enables you to undo the changes if they do not fix your problem. However, if you perform a system restore when the computer is in Safe Mode or by using the System Recovery options, you cannot undo the restore operation. In this case, if your problem is not resolved, you can run another system restore and choose a different restore point.
Q87. – (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. Disable Internet Connection Sharing.
B. From Internet Options, select Delete browsing history on exit.
C. Start the Microsoft Network Access Protection service.
D. From the Safety drop-down menu, configure InPrivate Filtering.
Q88. – (Topic 2)
You have a computer that runs Windows 7.
You need to copy files to a virtual hard disk (VHD) file.
What should you do first?
A. Run Dism.exe and specify the /image and /online parameters.
B. Open Windows Explorer, right-click the VHD file and select Open.
C. Run Diskpart.exe and then run the Select and Attach commands.
D. Run Imagex.exe and specify the /mountrw and /append parameters.
DiskpartMicrosoft command-line tool Diskpart is used to create and format volumes on the target computer.SelectShift the focus to an object.AttachAttaches a virtual disk file.
Q89. – (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed.
The client computers have a third-party firewall application installed.
You configure BranchCache on all computers to run in Distributed Cache mode.
You need to ensure that the client computers can access all cached files.
What should you do?
A. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
B. Check permissions.
C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443
D. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.
F. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
G. Run the netsh branchcache set service mode=DISTRIBUTED command
H. Create a Group policy object and configure the Set percetage of disk space used for client computer cache option.
I. Create a Group policy that sets Hash Publication for Branchcache as disabled.
Configuring Windows 7 as a BranchCache client involves enabling BranchCache, selecting either Hosted Cache mode or Distributed Cache mode, and then configuring the client firewall to allow BranchCache traffic.
You can configure BranchCache either using Group Policy or by using the Netsh command-line utility. The firewall rules that you configure depend on whether you are using Hosted Cache or Distributed Cache mode.
You can use predefined firewall rules or manually create them based on protocol and port. The required firewall rules are as follows: . The BranchCache – Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. You can create this rule using Windows Firewall With Advanced Security. . The BranchCache – Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. . The BranchCache – Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.
You need to configure the firewall rules only when you configure BranchCache using Group Policy. When you configure BranchCache using Netsh, the appropriate firewall rules are set up automatically.
Q90. – (Topic 3)
A standard user named User1 has a computer that runs Windows 7.
You need to ensure that User1 can run Windows Easy Transfer.
What should you do?
A. Disable User Account Control (UAC).
B. Add User1 to the Administrators group.
C. Configure User1 to have a complex password.
D. Copy the support folder from the Windows 7 installation media to the local hard disk drive.
Windows Easy Transfer Migration After you have set up Windows Easy Transfer on the source computer, you are ready to perform migration. If you want to migrate only a single user account, you can log on with that account to perform the transfer. If you want to migrate all accounts on the computer, you need to log on with a user account that has Local administrator privileges.
To do this, start Windows Easy Transfer, select the transfer method, and then, on the Which Computer Are You Using Now? page, select This Is My Old Computer. If you are using the External Hard Disk or USB storage device method, Windows Easy Transfer will then perform a migration check and provide an estimate of the size of the data you can transfer to the new computer on the source computer. If you are using the Network or Easy Transfer Cable method, you will select items for migration on the destination computer.
NOT User Account Control (UAC) UAC is a security feature of Windows 7 that informs you when the action that you want to undertake requires an elevation of privileges. If you logged on with a user account that was a member of the local administrators group in previous versions of Microsoft Windows, such as Windows XP, you automatically had administrator-level access at all times. This, by itself, was not a problem because recommended good practice was that people logged on with accounts that were members of the local administrator group only when they needed to do something related to administration. The problem with this is that people tended to use their administrator account as their normal user account. It was convenient for them because they did not have to log off and log on again each time they wanted to do something related to systems administration. Unfortunately, this behavior presented a security problem because any program run by a user logged on with an administrative account runs with the rights and privileges of that user. UAC resolves this problem by allowing a user that is a member of the local Administrators group to run as a standard user most of the time and to briefly elevate their privileges so that they are running as administrators when they attempt to carry out specific administration-related tasks.